☆20Nov 5, 2025Updated 3 months ago
Alternatives and similar repositories for Hunt
Users that are interested in Hunt are comparing it to the libraries listed below
Sorting:
- Enumerate the Domain for Readable and Writable Shares☆23Nov 14, 2025Updated 3 months ago
- LPE of CVE-2024-26230☆23Sep 1, 2024Updated last year
- Add Shadow Credentials to a target object by editing their msDS-KeyCredentialLink attribute☆25Jun 5, 2024Updated last year
- Python C2 with JScript Implant☆15Nov 15, 2023Updated 2 years ago
- A PowerShell script designed to detect misconfigured Azure Storage Accounts that could potentially be exploited for privilege escalation …☆13Apr 25, 2024Updated last year
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆13Oct 27, 2024Updated last year
- The Web UI for Antnium☆27Jun 14, 2022Updated 3 years ago
- Proof of Concept Exploit for CVE-2024-9465☆30Oct 9, 2024Updated last year
- .NET deserialization hunter☆82Jul 21, 2024Updated last year
- A simple rpc2socks alternative in pure Go.☆31Jul 8, 2024Updated last year
- Generate droppers with encrypted payloads automatically.☆54Nov 16, 2021Updated 4 years ago
- Some of my flag protected writeups☆11Apr 13, 2020Updated 5 years ago
- ☆21Jan 8, 2026Updated last month
- Loads a program into a memfd and runs it.☆11May 22, 2022Updated 3 years ago
- Automated (kinda) deployment of MalRDP infrastructure with Terraform & Ansible☆12Sep 15, 2023Updated 2 years ago
- DomainPasswordSpray is a tool written in PowerShell to perform a password spray attack against users of a domain. By default it will auto…☆13Jul 16, 2025Updated 7 months ago
- Impersonate Windows tokens in Nim☆23Aug 4, 2025Updated 6 months ago
- C# exfiltration tool☆13Sep 24, 2021Updated 4 years ago
- ☆47Dec 5, 2025Updated 2 months ago
- ☆15Jan 26, 2023Updated 3 years ago
- Tool for reconnaissance of AWS cloud environments☆16Oct 9, 2023Updated 2 years ago
- CLI Search for Security Operators of MITRE ATT&CK URLs☆17Jan 5, 2023Updated 3 years ago
- Find world writable directories that contain a .exe or .dll file☆13Aug 31, 2021Updated 4 years ago
- Copy metadata and digital signatures information from one Windows executable to another using Wine on a non-Windows platform☆18Apr 17, 2024Updated last year
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆41May 31, 2024Updated last year
- A simple Toolkit to BF and decrypt Windows EntraId CacheData☆20Jun 20, 2024Updated last year
- Proof-of-Concept to evade auditd by tampering via ptrace☆19Aug 3, 2023Updated 2 years ago
- Dump Lsass Memory Using a Reflective Dll☆14Feb 4, 2022Updated 4 years ago
- ☆31Aug 13, 2025Updated 6 months ago
- Templates for developing your own listeners and agents for AdaptixC2.☆44Feb 3, 2026Updated 3 weeks ago
- PoC script to demonstrate collection of SCCM attack paths that can be viewed in BH with OpenGraph☆24Aug 2, 2025Updated 6 months ago
- comprehensive .NET tool designed to extract and display detailed information about Windows Defender exclusions and Attack Surface Reducti…☆211Jun 10, 2024Updated last year
- ☆250Jul 31, 2024Updated last year
- A small tool I made to dump the export table of PE files. The primary use case was intended for use within DLL proxying.☆71Aug 16, 2022Updated 3 years ago
- Proof-of-Concept to evade auditd by writing /proc/PID/mem☆24Aug 21, 2023Updated 2 years ago
- An interactive TUI tool to create Brute Ratel C4 profiles based on BURP browsing data.☆31May 23, 2025Updated 9 months ago
- 7 days of Red Teaming TTPs that your favorite tools may use to acheive a post exploitation goal☆18Apr 17, 2021Updated 4 years ago
- Neo4LDAP is a query and visualization tool focused on Active Directory environments. It combines LDAP syntax with graph-based data analys…☆95Feb 3, 2026Updated 3 weeks ago
- A .NET implementation to dump SAM, SYSTEM, SECURITY registry hives from a remote host☆41Dec 8, 2023Updated 2 years ago